Cybersecurity talent shortages: the roots and the solutions
We explore the root causes of the talent crisis in the cybersecurity industry and look for possible solutions.
666 articles
We explore the root causes of the talent crisis in the cybersecurity industry and look for possible solutions.
This phishing campaign incorporates ghost spoofing, embedded text in images, a PDF file, a QR code, DocuSign imitation, and Cloudflare verification — yet it still completely misses the mark.
Today we talk about our five main centers of expertise and their contribution to Kaspersky’s products, threat intelligence and expert cybersecurity services.
Our developments, products, research, patents and expert teams harnessed for AI.
AI is changing the game, but are we ready for the risks? Discover key insights from our APAC Cybersecurity Weekend 2024 on how to tackle AI-driven threats and secure the future.
An Office 365 security alert as bait in a phishing email.
Where and why quantum-resistant cryptography has already been implemented, and what compatibility issues it caused.
The U.S. National Institute of Standards and Technology (NIST) has issued the first post-quantum encryption standards — FIPS 203, FIPS 204, and FIPS 205.
A paper from Uruguayan scientists lays out a highly technical and impractical method of spying on computer monitors.
Detection of techniques for disabling or modifying a local firewall, and other enhancements to the Kaspersky Unified Monitoring and Analysis Platform.
Windows Downdate is an attack that can roll back updates to your OS to reintroduce vulnerabilities and allow attackers to take full control of your system. How to mitigate the risk?
How to protect the less obvious parts of your IT infrastructure (and from what) — from printers and video surveillance kit to insulin pumps.
Telegram bot sells subscriptions to phishing tools to hack Microsoft 365 accounts, including 2FA bypass.
Cybercriminals are using AitM techniques to compromise accounts of company executives. How do they do this, and how to protect against it?
Today we tell you about our practices for releasing new products, and also updating existing releases, which reduce the risk of large-scale incidents.
Although Microsoft has radically revised the rollout plan for its controversial Recall feature, cybersecurity teams can’t afford to ignore the issue of “AI onlookers.
The story of how CrowdStrike released an update on a Friday and brought down thousands, tens of thousands, or maybe even hundreds of thousands of computers around the world.
A zero-day vulnerability actively exploited by attackers has been discovered in Internet Explorer — the browser that Microsoft supposedly laid to rest over a year ago.
Medium-sized businesses increasingly find themselves on the receiving end of targeted attacks. What tools does one need when basic security proves inadequate?